From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse cd 05 3d
cd053d20c2d8dbda2c25dc189f388452b8a9bcf1 cd053d6383ee1f4cc9157313015f95e10154c4a2 cd053d7bc3483ce41582b39fdf44c6e633aaf1f5